Analysis and improvement of an authenticated key exchange protocol

  • Authors:
  • Jiaxin Pan;Libin Wang;Changshe Ma

  • Affiliations:
  • School of Computer, South China Normal University, Guangzhou, China and Shanghai Key Laboratory of Integrate Administration Technologies for Information Security, Shanghai, China;School of Computer, South China Normal University, Guangzhou, China and Shanghai Key Laboratory of Integrate Administration Technologies for Information Security, Shanghai, China;School of Computer, South China Normal University, Guangzhou, China

  • Venue:
  • ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we analyze and improve an authenticated key exchange protocol named as UP which is proposed in a recent paper. We present a key compromise impersonation (KCI) attack and a secret replication (SR) attack against up. In order to formally capture these attacks, a variant of Canetti-Krawczyk model named as vCK model is proposed. Using this variant, we describe a successful KCI attack and a successful SR attack against up. To avoid the attacks, we provide an improved protocol named as UP+ by binding the shared secret to the session identifier. UP+ is provably secure under the hardness of the Gap Diffie-Hellman problem in the random oracle model. Our improved protocol combines the higher security level with comparable efficiency.